<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>Cybersecurity Canada</title>
    <subtitle>Free cybersecurity resources and assessment for Canadian small and medium businesses. Based on the Canadian Centre for Cyber Security&#39;s Baseline Cyber Security Controls.</subtitle>
    <link href="https://cybersecuritycanada.ca/feed.xml" rel="self" type="application/atom+xml"/>
    <link href="https://cybersecuritycanada.ca/" rel="alternate" type="text/html"/>
    <id>https://cybersecuritycanada.ca/</id>
    <updated>2026-03-07T00:00:00.000Z</updated>
    <author>
        <name>Cybersecurity Canada</name>
    </author>
    <entry>
        <title>Building an Incident Response Plan for Your Canadian Business</title>
        <link href="https://cybersecuritycanada.ca/news/posts/building-an-incident-response-plan-for-your-canadian-business/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/building-an-incident-response-plan-for-your-canadian-business/</id>
        <published>2026-03-07T00:00:00.000Z</published>
        <updated>2026-03-07T00:00:00.000Z</updated>
        <summary>The Canadian Centre for Cyber Security designates incident response planning as the first of its 13 Baseline Controls. Here is what the guidance says, what a plan includes, and what Canadian SMBs face without one.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>What to Do in the First 24 Hours After a Cyber Attack</title>
        <link href="https://cybersecuritycanada.ca/news/posts/what-to-do-in-the-first-24-hours-after-a-cyber-attack/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/what-to-do-in-the-first-24-hours-after-a-cyber-attack/</id>
        <published>2026-02-28T00:00:00.000Z</published>
        <updated>2026-02-28T00:00:00.000Z</updated>
        <summary>When a cyber attack hits, the decisions you make in the first hours determine how much damage your business sustains. This step-by-step guide walks Canadian small business owners through the critical first 24 hours.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Guide"/>
    </entry>
    <entry>
        <title>Cyber Insurance: What Canadian SMBs Need to Understand</title>
        <link href="https://cybersecuritycanada.ca/news/posts/cyber-insurance-what-canadian-smbs-need-to-understand/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/cyber-insurance-what-canadian-smbs-need-to-understand/</id>
        <published>2026-02-22T00:00:00.000Z</published>
        <updated>2026-02-22T00:00:00.000Z</updated>
        <summary>Cyber insurance adoption among Canadian businesses remains low, and denied claims are making headlines. Here is what the market looks like, what insurers are requiring, and what happens when those requirements are not met.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Insights"/>
    </entry>
    <entry>
        <title>Ransomware: What Canadian Businesses Need to Know Before, During, and After an Attack</title>
        <link href="https://cybersecuritycanada.ca/news/posts/ransomware-what-canadian-businesses-need-to-know-before-during-and-after-an-attack/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/ransomware-what-canadian-businesses-need-to-know-before-during-and-after-an-attack/</id>
        <published>2026-02-21T00:00:00.000Z</published>
        <updated>2026-02-21T00:00:00.000Z</updated>
        <summary>Ransomware remains the top cybercrime threat facing Canadian organizations. Here is what Canadian SMBs should do before an attack happens, what to do if one is underway, and how to recover.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Threats"/>
    </entry>
    <entry>
        <title>USB Drives and Portable Media: The Security Risk Sitting in Your Desk Drawer</title>
        <link href="https://cybersecuritycanada.ca/news/posts/usb-drives-and-portable-media-the-security-risk-in-your-desk-drawer/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/usb-drives-and-portable-media-the-security-risk-in-your-desk-drawer/</id>
        <published>2026-02-20T00:00:00.000Z</published>
        <updated>2026-02-20T00:00:00.000Z</updated>
        <summary>USB drives remain one of the easiest ways for data to leave your business and one of the quietest ways for threats to get in. Here&#39;s what Canadian SMBs need to know.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>Vendor and Third-Party Risk: How Your Suppliers Can Become Your Weakest Link</title>
        <link href="https://cybersecuritycanada.ca/news/posts/vendor-and-third-party-risk-how-your-suppliers-can-become-your-weakest-link/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/vendor-and-third-party-risk-how-your-suppliers-can-become-your-weakest-link/</id>
        <published>2026-02-14T00:00:00.000Z</published>
        <updated>2026-02-14T00:00:00.000Z</updated>
        <summary>Your cybersecurity is only as strong as the least secure vendor with access to your systems or data. Here&#39;s how Canadian small businesses can assess and manage third-party risk without a dedicated security team.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>Windows Notepad Vulnerability: What Canadian Businesses Should Know</title>
        <link href="https://cybersecuritycanada.ca/news/posts/windows-notepad-vulnerability-what-canadian-businesses-should-know/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/windows-notepad-vulnerability-what-canadian-businesses-should-know/</id>
        <published>2026-02-11T00:00:00.000Z</published>
        <updated>2026-02-11T00:00:00.000Z</updated>
        <summary>A critical flaw in Windows Notepad could let attackers take control of your PC through a simple file. Here&#39;s what Canadian business owners need to know and do.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Threats"/>
    </entry>
    <entry>
        <title>Notepad++ Supply Chain Attack: What Canadian Businesses Should Know</title>
        <link href="https://cybersecuritycanada.ca/news/posts/notepad-plus-plus-supply-chain-attack-what-canadian-businesses-should-know/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/notepad-plus-plus-supply-chain-attack-what-canadian-businesses-should-know/</id>
        <published>2026-02-10T00:00:00.000Z</published>
        <updated>2026-02-10T00:00:00.000Z</updated>
        <summary>A Chinese state-sponsored group hijacked Notepad++ updates for months, delivering targeted malware through a trusted update channel. Here&#39;s what happened and what to do.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Threats"/>
    </entry>
    <entry>
        <title>The Hidden Cost of Assuming Your Business Is Too Small to Attack</title>
        <link href="https://cybersecuritycanada.ca/news/posts/the-hidden-cost-of-assuming-your-business-is-too-small-to-attack/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/the-hidden-cost-of-assuming-your-business-is-too-small-to-attack/</id>
        <published>2026-02-10T00:00:00.000Z</published>
        <updated>2026-02-10T00:00:00.000Z</updated>
        <summary>The belief that your business is too small to be targeted isn&#39;t just wrong — it&#39;s the most expensive cybersecurity assumption a Canadian SMB can make. Here&#39;s what it actually costs.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Insights"/>
    </entry>
    <entry>
        <title>How to Use Your Cybersecurity Assessment Results</title>
        <link href="https://cybersecuritycanada.ca/news/posts/how-to-use-your-assessment-results/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/how-to-use-your-assessment-results/</id>
        <published>2026-02-07T00:00:00.000Z</published>
        <updated>2026-02-07T00:00:00.000Z</updated>
        <summary>Completed the assessment? Here&#39;s how to interpret your score, prioritize improvements, and build a practical security roadmap for your organization.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Guide"/>
    </entry>
    <entry>
        <title>Why Canadian SMBs Can No Longer Ignore Cybersecurity</title>
        <link href="https://cybersecuritycanada.ca/news/posts/why-canadian-smbs-need-cybersecurity/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/why-canadian-smbs-need-cybersecurity/</id>
        <published>2026-02-01T00:00:00.000Z</published>
        <updated>2026-02-01T00:00:00.000Z</updated>
        <summary>Canadian small businesses face growing cyber threats. Learn why cybersecurity has become a business necessity, not just an IT concern.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Insights"/>
    </entry>
    <entry>
        <title>When Cyber Attacks Become Physical Threats</title>
        <link href="https://cybersecuritycanada.ca/news/posts/when-cyber-attacks-become-physical-threats/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/when-cyber-attacks-become-physical-threats/</id>
        <published>2026-01-28T00:00:00.000Z</published>
        <updated>2026-01-28T00:00:00.000Z</updated>
        <summary>Cyber attacks don&#39;t always stay digital. Criminals are using email compromises, system hacks, and signal jamming as stepping stones to physical crimes like burglary and fraud.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Threats"/>
    </entry>
    <entry>
        <title>Backup and Recovery: 5 Assumptions That Fail When It Matters</title>
        <link href="https://cybersecuritycanada.ca/news/posts/backup-and-recovery-assumptions-that-fail/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/backup-and-recovery-assumptions-that-fail/</id>
        <published>2026-01-25T00:00:00.000Z</published>
        <updated>2026-01-25T00:00:00.000Z</updated>
        <summary>Most businesses think their backups are fine — until they try to restore from them. Here are five common backup assumptions that fail during a real incident.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>Why Your Canadian Business Needs an AI Usage Policy</title>
        <link href="https://cybersecuritycanada.ca/news/posts/why-your-business-needs-an-ai-usage-policy/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/why-your-business-needs-an-ai-usage-policy/</id>
        <published>2026-01-20T00:00:00.000Z</published>
        <updated>2026-01-20T00:00:00.000Z</updated>
        <summary>Your employees are already using AI tools — with or without your knowledge. Here&#39;s why a clear AI usage policy protects your business and what it should cover.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>Understanding Canada&#39;s Baseline Cyber Security Controls for SMBs</title>
        <link href="https://cybersecuritycanada.ca/news/posts/understanding-canadas-baseline-cyber-security-controls/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/understanding-canadas-baseline-cyber-security-controls/</id>
        <published>2026-01-15T00:00:00.000Z</published>
        <updated>2026-01-15T00:00:00.000Z</updated>
        <summary>The Canadian Centre for Cyber Security has published baseline controls specifically designed for small and medium organizations. Here&#39;s what you need to know.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Standards"/>
    </entry>
    <entry>
        <title>The Real Cost of Cyber Downtime for Canadian SMBs</title>
        <link href="https://cybersecuritycanada.ca/news/posts/the-real-cost-of-cyber-downtime-for-canadian-smbs/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/the-real-cost-of-cyber-downtime-for-canadian-smbs/</id>
        <published>2026-01-05T00:00:00.000Z</published>
        <updated>2026-01-05T00:00:00.000Z</updated>
        <summary>When systems go offline due to a cyber incident, the costs go far beyond the ransom demand. Here&#39;s what Canadian small businesses actually face.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Insights"/>
    </entry>
    <entry>
        <title>Business Email Compromise (BEC): Canada&#39;s Most Costly Cyber Threat</title>
        <link href="https://cybersecuritycanada.ca/news/posts/business-email-compromise-canadas-most-costly-cyber-threat/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/business-email-compromise-canadas-most-costly-cyber-threat/</id>
        <published>2025-12-30T00:00:00.000Z</published>
        <updated>2025-12-30T00:00:00.000Z</updated>
        <summary>Business email compromise doesn&#39;t use malware or exploit software vulnerabilities. It exploits trust — and it&#39;s responsible for more financial losses than any other form of cybercrime. Here&#39;s what Canadian businesses need to know.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Threats"/>
    </entry>
    <entry>
        <title>Remote Work Security for Canadian Businesses</title>
        <link href="https://cybersecuritycanada.ca/news/posts/remote-work-security-for-canadian-businesses/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/remote-work-security-for-canadian-businesses/</id>
        <published>2025-12-18T00:00:00.000Z</published>
        <updated>2025-12-18T00:00:00.000Z</updated>
        <summary>Remote and hybrid work is here to stay. Here&#39;s how Canadian SMBs can keep their data secure when employees work outside the office.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>Cloud Security Basics for Canadian Small Businesses</title>
        <link href="https://cybersecuritycanada.ca/news/posts/cloud-security-basics-for-canadian-small-businesses/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/cloud-security-basics-for-canadian-small-businesses/</id>
        <published>2025-12-12T00:00:00.000Z</published>
        <updated>2025-12-12T00:00:00.000Z</updated>
        <summary>Moving to the cloud doesn&#39;t mean your data is automatically secure. Microsoft 365, Google Workspace, and other cloud platforms require configuration — and the default settings often leave gaps. Here&#39;s what Canadian SMBs need to get right.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>How to Recognize Phishing Emails: A Guide for Canadian Businesses</title>
        <link href="https://cybersecuritycanada.ca/news/posts/how-to-recognize-phishing-emails/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/how-to-recognize-phishing-emails/</id>
        <published>2025-12-05T00:00:00.000Z</published>
        <updated>2025-12-05T00:00:00.000Z</updated>
        <summary>Phishing is the number one cyber threat to Canadian businesses. Learn the warning signs and how to protect your organization.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Threats"/>
    </entry>
    <entry>
        <title>Employee Security Awareness Training: What Actually Works</title>
        <link href="https://cybersecuritycanada.ca/news/posts/employee-security-awareness-training-what-actually-works/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/employee-security-awareness-training-what-actually-works/</id>
        <published>2025-11-28T00:00:00.000Z</published>
        <updated>2025-11-28T00:00:00.000Z</updated>
        <summary>Annual compliance videos don&#39;t change behaviour. Here&#39;s what the research says about effective security awareness training for Canadian small businesses — and how to build a program that actually reduces risk.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>Password Security: What Canadian Businesses Get Wrong</title>
        <link href="https://cybersecuritycanada.ca/news/posts/password-security-what-canadian-businesses-get-wrong/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/password-security-what-canadian-businesses-get-wrong/</id>
        <published>2025-11-20T00:00:00.000Z</published>
        <updated>2025-11-20T00:00:00.000Z</updated>
        <summary>Forced password rotation, short minimums, and no password manager — here are the most common password mistakes Canadian SMBs make and how to fix them.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>Multi-Factor Authentication: The Single Biggest Security Upgrade for Canadian SMBs</title>
        <link href="https://cybersecuritycanada.ca/news/posts/multi-factor-authentication-the-single-biggest-security-upgrade-for-canadian-smbs/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/multi-factor-authentication-the-single-biggest-security-upgrade-for-canadian-smbs/</id>
        <published>2025-11-10T00:00:00.000Z</published>
        <updated>2025-11-10T00:00:00.000Z</updated>
        <summary>MFA blocks over 99% of automated account attacks. It&#39;s free to enable on most business platforms, takes minutes to set up, and is increasingly required by cyber insurers. Here&#39;s what Canadian businesses need to know.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Best Practices"/>
    </entry>
    <entry>
        <title>Why Cybercriminals Target Small Businesses</title>
        <link href="https://cybersecuritycanada.ca/news/posts/why-cybercriminals-target-small-businesses/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/why-cybercriminals-target-small-businesses/</id>
        <published>2025-11-01T00:00:00.000Z</published>
        <updated>2025-11-01T00:00:00.000Z</updated>
        <summary>Small businesses are not too small to be targeted. Here&#39;s why cybercriminals see Canadian SMBs as attractive targets and what you can do about it.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Threats"/>
    </entry>
    <entry>
        <title>5 Easy Cybersecurity Wins for Canadian Small Businesses</title>
        <link href="https://cybersecuritycanada.ca/news/posts/5-easy-cybersecurity-wins-for-canadian-small-businesses/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/5-easy-cybersecurity-wins-for-canadian-small-businesses/</id>
        <published>2025-10-28T00:00:00.000Z</published>
        <updated>2025-10-28T00:00:00.000Z</updated>
        <summary>You don&#39;t need a massive budget or a dedicated IT team to meaningfully improve your cybersecurity. These five actions can be implemented quickly and address the most common ways Canadian small businesses get breached.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Guide"/>
    </entry>
    <entry>
        <title>Canada&#39;s Privacy Landscape: What Small Businesses Need to Know</title>
        <link href="https://cybersecuritycanada.ca/news/posts/canadas-privacy-landscape-what-small-businesses-need-to-know/" rel="alternate" type="text/html"/>
        <id>https://cybersecuritycanada.ca/news/posts/canadas-privacy-landscape-what-small-businesses-need-to-know/</id>
        <published>2025-10-15T00:00:00.000Z</published>
        <updated>2025-10-15T00:00:00.000Z</updated>
        <summary>PIPEDA, provincial laws, and breach reporting — a plain-language overview of the privacy obligations that apply to Canadian small businesses.</summary>
        <author>
            <name>Cybersecurity Canada</name>
        </author>
        <category term="Compliance"/>
    </entry>
</feed>
